IBM and log data management startup LogDNA are collaborating on a new cloud service designed to help developers spot faults and debug code in data stored in the IBM ...Full Article
Applications containers and other microservices are handling production workloads at an increasing rate, but several studies emphasize that container security lags. The latest concludes that risks around runtime attacks ...Full Article
Oracle has moved to add bandwidth and security to its cloud portfolio with the acquisition of Talari Networks, a software-defined networking specialist. Terms of the acquisition announced on Thursday ...Full Article
An open source version of the Kubernetes cluster orchestrator is intended to package and deploy cloud-native applications to restricted, on-premise infrastructure such as government clouds. Gravitational, which was founded ...Full Article
As native cloud applications expand across companies large and in between, greater attention is being paid to securing the ephemeral application containers increasingly used to deliver distributed apps. Cloud ...Full Article
Dome9, the public cloud security specialist, has been acquired by another Israel-based cybersecurity vendor, Check Point Software. Check Point, Tel Aviv, said Wednesday (Oct. 24) its acquisition of Dome9 ...Full Article
The National Science Foundation will fund a broad range of cybersecurity, data privacy and network security research projects that includes a new Center for Trustworthy Machine Learning. NSF’s Secure ...Full Article
With upwards of 85 percent of companies using more than one cloud provider, the shift to multi-cloud deployments driven by emerging open-source platforms has prompted infrastructure vendors to begin ...Full Article
Roiling the tech industry and intelligence community, a news story on the Bloomberg BusinessWeek site reports that spies in China hacked Super Micro Computer servers widely distributed throughout the ...Full Article
All the talk and hype surrounding AI, machine learning and blockchain technologies has so far failed to translate into actual spending on new IT initiatives, concludes a new industry ...Full Article
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptRead More
Privacy & Cookies Policy
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.